TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Exploiting Copilot AI for SharePoint

4 点作者 ocdtrekkie6 天前

1 comment

p_ing6 天前
This isn&#x27;t all that interesting. There&#x27;s no exploit as we hope to know it, but rather it&#x27;s just glorified search via another means. And indeed, Copilot is simply using Microsoft Search (which federates with SPO Search) to find the content to return. Audit logs still exist!<p>The article author also fails to identify that one of the more effective ways of combating this is Sensitivity Labels (yeah, another subscription, but big companies don&#x27;t care). But correctly states that permission hygiene is the most effective way to do this.<p>&gt; when files and images are shared on Microsoft Teams, SharePoint automatically creates a site for them.<p>And no, that&#x27;s not how it works. A Microsoft Team already has an SPO site. When a file is uploaded to a Team, it is actually uploaded to SPO. In a 1:1 or 1:Many chat outside of a Team, it is uploaded to the sender&#x27;s OneDrive account.
评论 #43915219 未加载